If Offense Has Advantage We Must Analyze Logs Better

If  the theory says that Offense will always find a way into your environment (somehow) with  a mistake or just better attacks then we must get better at developing Logs and react to attacks as fast as we can. This interesting and well thought out guide from Crest-approved.org¹ discusses what should be done in the … Read more

Passwords Guessed: Nightmare Scenario

What happens if your passwords are stolen?   Never mind how. Let’s assume somehow with  “magic” your passwords are stolen.  Now what? It is useful to make this risk assessment exercises to see what can happen in your network. This is why one does not want to give more access than absolutely necessary.   If … Read more

Cracking Wifi Passwords Easier Than You Think

The Wifi device that you have (either yourself or by someone else) are setup with: Decide on naming your device, and also decide on the encryption technology to set up the network(your Internet access). Of course you could decide not to encrypt but in that case you are screwed security wise.  So let’s assume that … Read more